A novel approximate computing based security primitive for the Internet of Things
Title | A novel approximate computing based security primitive for the Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Gao, M., Qu, G. |
Conference Name | 2017 IEEE International Symposium on Circuits and Systems (ISCAS) |
Keywords | approximate computing, composability, cryptography, device authentication, digital watermarking, Fingerprinting, hardware security vulnerabilities, Human Behavior, human factors, information hiding approach, Internet infrastructure, Internet of Things, IoT devices, IoT security, Lightweight Encryption, Metrics, pubcrawl, Resiliency, security primitive, telecommunication power management, telecommunication security, Three-dimensional displays, ultra-low power design requirement, Watermarking |
Abstract | The Internet of Things (IoT) has become ubiquitous in our daily life as billions of devices are connected through the Internet infrastructure. However, the rapid increase of IoT devices brings many non-traditional challenges for system design and implementation. In this paper, we focus on the hardware security vulnerabilities and ultra-low power design requirement of IoT devices. We briefly survey the existing design methods to address these issues. Then we propose an approximate computing based information hiding approach that provides security with low power. We demonstrate that this security primitive can be applied for security applications such as digital watermarking, fingerprinting, device authentication, and lightweight encryption. |
URL | https://ieeexplore.ieee.org/document/8050360 |
DOI | 10.1109/ISCAS.2017.8050360 |
Citation Key | gao_novel_2017 |
- IoT devices
- Watermarking
- ultra-low power design requirement
- Three-dimensional displays
- telecommunication security
- telecommunication power management
- security primitive
- Resiliency
- pubcrawl
- Metrics
- Lightweight Encryption
- IoT security
- approximate computing
- Internet of Things
- Internet infrastructure
- information hiding approach
- Human Factors
- Human behavior
- hardware security vulnerabilities
- Fingerprinting
- digital watermarking
- device authentication
- Cryptography
- composability